When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. RegreSSHion - Wikipedia

    en.wikipedia.org/wiki/RegreSSHion

    RegreSSHion is a family of security bugs in the OpenSSH software that allows for an attacker to remotely execute code and gain potential root access on a machine running the OpenSSH Server. [1] [2] The vulnerability was discovered by the Qualys Threat Research Unit and was disclosed on July 1, 2024.

  3. XZ Utils backdoor - Wikipedia

    en.wikipedia.org/wiki/XZ_Utils_backdoor

    [b] [4] The backdoor gives an attacker who possesses a specific Ed448 private key remote code execution through OpenSSH on the affected Linux system. The issue has been given the Common Vulnerabilities and Exposures number CVE-2024-3094 and has been assigned a CVSS score of 10.0, the highest possible score. [5]

  4. Shellshock (software bug) - Wikipedia

    en.wikipedia.org/wiki/Shellshock_(software_bug)

    Shellshock is an arbitrary code execution vulnerability that offers a way for users of a system to execute commands that should be unavailable to them. This happens through Bash's "function export" feature, whereby one Bash process can share command scripts with other Bash processes that it executes. [ 17 ]

  5. OpenSSH - Wikipedia

    en.wikipedia.org/wiki/OpenSSH

    The OpenSSH code is not directly concerned, the backdoor is caused by the dependencies on liblzma via libsystemd applied by a tierce patch, applied by various Linux distributions. [ citation needed ] On July 1, 2024, the RegreSSHion security vulnerability was disclosed, which could enable a remote attacker to cause OpenSSH to execute arbitrary ...

  6. Time-of-check to time-of-use - Wikipedia

    en.wikipedia.org/wiki/Time-of-check_to_time-of-use

    In software development, time-of-check to time-of-use (TOCTOU, TOCTTOU or TOC/TOU) is a class of software bugs caused by a race condition involving the checking of the state of a part of a system (such as a security credential) and the use of the results of that check.

  7. Return-oriented programming - Wikipedia

    en.wikipedia.org/wiki/Return-oriented_programming

    The widespread implementation of data execution prevention made traditional buffer overflow vulnerabilities difficult or impossible to exploit in the manner described above. Instead, an attacker was restricted to code already in memory marked executable, such as the program code itself and any linked shared libraries .

  8. Salt (software) - Wikipedia

    en.wikipedia.org/wiki/Salt_(software)

    In April 2020, F-Secure revealed two high severity RCE (Remote Code Execution) vulnerabilities, identified as CVE-2020-11651 and CVE-2020-11652, with CVSS score reaching as high as 10. These critical vulnerabilities were found within Salt's default communication channel ZeroMQ , and the initial research discovered 6000 vulnerable Salt servers.

  9. Code injection - Wikipedia

    en.wikipedia.org/wiki/Code_injection

    Here, the code under attack is the code that is trying to check the parameter, the very code that might have been trying to validate the parameter to defend against an attack. [20] Any function that can be used to compose and run a shell command is a potential vehicle for launching a shell injection attack.